1. OUR COMMITMENT TO DATA PROTECTION
Safety is a strategic element, as well as one of our key features. We achieve our vision "IT as safe and reliable as the big ones" with the following four pillars:
1.1 Information Security
Information is an indispensable basis for the corporate success of Cytracon and its customers. That is why we provide a great deal of information and the necessary aids. Our aim is to ensure the protection, confidentiality, integrity and availability of information to the extent necessary for our operations. Important pillars here are competent, safety-sensitized employees and our risk management.
Cytracon employees ensure that information receives the necessary protection, depending on the classification, and that it strictly adheres to laws, internal regulations and customer agreements.
The management provides the appropriate structures and resources, commits itself to information security and has also created the strategic roles for implementation.
1.3 Risk Management
With systematic risk management, we reduce the risks that affect Cytracon web services to a sensible degree. All risk management decisions are in the context of corporate goals and strategic risk management by Cytracon Webservices. We particularly focus on those risks associated with information processing and information dissemination.
1.4 Continuous improvement
The necessary awareness-raising and training on information security and data protection takes place regularly in accordance with the process of continuous improvement (CIP). It is audited annually with an internal audit.
3. WHY DO WE COLLECT AND PROCESS DATA?
We collect and process data for a variety of reasons, which can be summarized as follows. In particular, we process your data for:
Offers and services:
Communication with the customer:
Competitiveness and starting organization:
4. WHEN DO WE RECORD PERSONAL DATA FROM YOU?
We collect personal information when we contact you. There are many different situations in which we have contact with you, for example in the following circumstances:
5. WHAT PERSONAL DATA WE GET FROM YOU?
Some of the personal information we collect will be provided by you, some will be collected automatically or manually when you contact us. The data we collect varies from case to case. The personal information we collect about you may include:
Data on customer activities:
6. HOW LONG WILL WE KEEP YOUR PERSONAL DATA?
We retain your personal information for as long as we deem necessary or appropriate to comply with applicable law, or as long as it is necessary for the purposes for which it was collected.
We delete your personal data as soon as it is no longer needed and in any case after expiry of the statutory retention period.
7. TO WHOM DO WE CONTINUE TO GIVE YOUR PERSONAL DATA?
Our service providers are contractually obliged to process your personal data exclusively in accordance with our instructions. We also impose the obligation on our service providers to take technical and organizational measures to ensure the protection of your personal data. If the service providers are located in countries where applicable law does not provide for the protection of personal data that is comparable to Swiss law, we oblige our service providers to comply with Swiss data protection standards.
Finally, we may disclose your personal information if we believe it necessary to protect and defend our rights, in accordance with applicable laws and regulations, in connection with legal proceedings, at the request of competent courts and authorities, or under other statutory obligations Property.
Under no circumstances will we sell your personal information to third parties.
8. HOW DO WE PROTECT YOUR PERSONAL DATA?
We have taken reasonable technical and organizational measures to ensure the confidentiality and security of your personal information. We protect your personal data against unauthorized or accidental destruction, accidental loss, technical errors, falsification, theft or unlawful use and against unauthorized modification, duplication, access or other unauthorized editing.
However, you should be aware that the transfer of information over the Internet and other electronic media carries certain security risks and that we can not guarantee the security of the information transmitted in this way.
Which cookies do we use and how?
Most of the cookies we use are automatically deleted from your computer or mobile device at the end of the browser session. We also use persistent cookies that are stored on your computer or mobile device after the end of your browser session. On your next visit to our website, your preferred input and settings will be automatically recognized. These cookies are automatically deactivated after the programmed time has expired. They serve to make our website more user-friendly, effective and secure. These cookies, for example, display information that is specifically tailored to your interests.
The retargeting technology we use enables us to target ads to those users who have been interested in our online store and our products in the past. We are convinced that the presentation of advertisements that are individually tailored to the interests of the individual is usually more interesting to the user than advertising that does not have such a personal connection. Retargeting displays advertising based on a cookie-based analysis of the user's past behavior. To do this, we partner with affiliates and, accordingly, cookies from our affiliates may also be stored on your computer or mobile device when you visit our website. These cookies are automatically deactivated after the programmed time has expired.
What data is stored in the cookies?
The cookies we use do not store any personal information. The cookies we use can not be assigned to a specific individual. If a cookie is enabled, it will be assigned an identification number.
How can you prevent cookies from being stored?
Most internet browsers accept cookies automatically. However, you can use the settings to tell your browser not to accept cookies or to ask you each time before accepting a cookie from any website you visit. You can also delete cookies from your computer or mobile device by using the corresponding function of your browser. If you choose to opt-out of our cookies or those of our affiliates, you will not be able to see certain information on our website or use some features to enhance your visit.
How do we rate log files?
For technical reasons, every time you access our website, certain usage data are transmitted to us from your Internet browser and stored in so-called log files. These usage data are as follows: date and time of access to the website; IP address of your computer or mobile device; Address of the website from which you came to us; Transfer data volume, plus the name and version of your browser.
Analysis of the log files helps us to further improve our website and make it more user-friendly, to detect errors faster and to manage server capacities. For example, we can use the log files to determine when our website is particularly popular, and to provide the necessary data to make the best possible use of it.
How do we use Google Analytics for web analytics?
We use Google Analytics to constantly improve and optimize our website.
At our direction, Google uses the information received through the cookies to analyze your use of our website and to generate reports on website activity, which we then provide for analysis purposes. Google may disclose this information to third parties if required by law or when processing the data on behalf of Google. In no case will Google combine your IP address with other data.
You can prevent the installation and storage of cookies by setting your browser software accordingly. However, please note that you will not be able to see certain information on our website and that you will no longer be able to use some features that are designed to enhance your visit.
By using this website, you agree that the data collected by Google may be processed as described above and for the purpose described above. For more information on privacy at Google, see:
How do we use social plugins?
Cytracon Webservices is featured on the social networks of Facebook, LinkedIn, Twitter, Xing and YouTube. By activating a link to one of these social networks, social network operators may receive the information that you have visited our website. If you are logged in to one of these networks during your visit to our website, the operator may assign this visit to your user account. If you do not want this, we recommend that you log out of social networks before visiting our website.
You can prevent the storage of cookies by setting your browser software accordingly (see above instructions).
10. HOW CAN YOU VIEW YOUR PERSONAL DATA?
You are always entitled to ask us for information about the personal data processed by us, to correct or supplement it, to prohibit the processing of your personal data or to demand that it be deleted.
11. How do we update this privacy statement?